CN101867601B - File-level P2P network flow identification method - Google Patents

File-level P2P network flow identification method Download PDF

Info

Publication number
CN101867601B
CN101867601B CN2010101754826A CN201010175482A CN101867601B CN 101867601 B CN101867601 B CN 101867601B CN 2010101754826 A CN2010101754826 A CN 2010101754826A CN 201010175482 A CN201010175482 A CN 201010175482A CN 101867601 B CN101867601 B CN 101867601B
Authority
CN
China
Prior art keywords
packet
payload
protocol type
file
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010101754826A
Other languages
Chinese (zh)
Other versions
CN101867601A (en
Inventor
嵩天
周舟
贾云得
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN2010101754826A priority Critical patent/CN101867601B/en
Publication of CN101867601A publication Critical patent/CN101867601A/en
Application granted granted Critical
Publication of CN101867601B publication Critical patent/CN101867601B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a file-level P2P network flow identification method, belonging to the technical field of networks. Based on the existing deep-level data packet detection technology, hash information of a file is extracted from the effective load of a data packet according to the P2P protocol type labeled by the data packet. Since the specific file information transmitted by a P2P stream is extracted through the method, the grain size of identification is finer. By adopting the method of the invention, a network administrator can take more effective measures to manage P2P flow; and moreover, the file information identified by the method of the invention can be used for judging the validity of the file and analyzing the concern degree of resources and the downloading behaviors of users and the like.

Description

File-level P 2 P network flow identification method
Technical field
The present invention relates to a kind of file-level P 2 P (Peer-to-Peer) network flow identification method, belong to networking technology area.
Background technology
In recent years, along with the continuous progress of P2P network technology, the popularity degree that various P2P use is increasingly high.The ratio of P2P flow just surpassed the flow that HTTP uses on the Internet from 2004, became the main body of internet traffic.The Germany one tame authoritative Ipoque of mechanism claims that in a the Internet of 2008-2009 investigation report the P2P flow has reached whole more than 60% of flow in the Internet.
P2P has brought great challenge when bringing fundamental change to the Internet use pattern, also for network management and safety.Its harm shows: 1. P2P uses and adopts many concurrent connections to carry out transfer of data usually, has aggravated the congested of core net and Access Network, makes that other important service can not get ensureing, directly has influence on the quality of services for users rank.2. the reciprocity transmission means of P2P network has been brought the change of network traffics patterns; The uplink traffic of Access Network significantly increases; Making with ADSL is that traditional asymmetrical network access way of representative does not more and more receive user's approval, has brought more overhead to Virtual network operator.3. the P2P network provides and has shared easily and the mechanism of routing fast, and for some internet worm, wooden horse provide better invasion chance, it is big to involve scope, broad covered area, and the loss meeting that causes is very big.4. the prosperity of P2P application has been aggravated the distribution of pirate medium, makes that impinge issues such as mp3, video display are serious day by day, has increased the difficulty of intellectual property protection.
Virtual network operator and enterprise network management department want the P2P network traffics are effectively managed, and just must capture its bottleneck technology---the identification of P2P flow.Existing P 2P flow recognition technology mainly contains the three major types method:
(1) based on the recognition methods of port numbers
Recognition methods based on port numbers is specially: the default port that the port numbers of the network data flow that obtains and P2P are used number matees, if mate successfully, thinks that then this network data flow is the P2P flow.Its shortcoming is: the accuracy of identification is lower.Main cause has: along with the P2P application and development, most of P2P use the port numbers that allows the user manually to select to be provided with acquiescence; In addition, many emerging P2P use and adopt port numbers at random, and this just makes that its port numbers is unpredictable; Also have other a kind of phenomenon at present, P2P uses the default port number bring into use some other regular services, such as the function port that pretends oneself with 80 ports.
(2) deep layer packet detection technique (Deep Packet Inspection, DPI)
Deep layer packet detection technique is through finding that to the detection of packet application layer protocol P2P uses.This technology is used a feature database storage payload characteristic information, and the packet that meets the payload characteristic promptly is regarded as the P2P packet.The accuracy of this method identification is higher, easy to understand, upgrading are convenient, it is simple to safeguard, is the most general method of utilization at present.But present deep layer packet detection technique only can be accomplished other identification of stream (flow) level, does not also accomplish the identification of file-level, promptly identifies the concrete fileinfo of P2P flow transmission.
(3) based on the recognition methods of traffic characteristic
P2P uses as a kind of new application that makes full use of client resource, and it is used with respect to other at the traffic characteristic that transport layer shows, and like HTTP, FTP, DNS etc. many different places is arranged.Recognition methods based on traffic characteristic is: the traffic characteristic through detection makes new advances finds that P2P uses.Its shortcoming has: 1. because the transport layer stream measure feature generally can not clearly be indicated the application layer protocol type, so this method to the ability of P2P application class a little less than, and application class is extremely important for the enforcement of QoS (Quality of Servic, service quality).2. since the existence of asymmetric route and packet loss, re-transmission phenomenon cause accurately confirming traffic characteristic, thereby might the accuracy of P2P flow detection be impacted.
Summary of the invention
The objective of the invention is on the basis of existing deep layer packet detection technique, to propose a kind of file-level P 2 P network flow identification method in order to overcome the deficiency that prior art exists.The present invention is deep into file-level, and then identifies the concrete fileinfo of P2P flow transmission on the basis that accurately identification P2P flows.
The objective of the invention is to realize through following technical proposals.
A kind of file-level P 2 P network flow identification method, its concrete operations step is following:
Step 1: set up a network flow table, the structure of this table includes, but are not limited to following field: the source IP of packet, source port, purpose IP, destination interface and file hash information;
Step 2: this step can with step 1 simultaneous operation: set up a P2P feature database, it only comprises the P2P payload characteristic information relevant with file; The structure of this P2P feature database comprises following field: P2P protocol type, payload characteristic.
Step 3: resolve in the packet header to the packet that receives, obtains upper strata transport protocol type, source IP, source port, purpose IP, the destination interface of this packet;
Step 4: whether the upper strata transport protocol type of judging this packet is TCP, if execution in step 5 then; Otherwise turn to step 3;
Step 5: whether inquiry exists a record in the network flow table that step 1 is set up; Source IP, source port, purpose IP, the destination interface of the packet that its source IP, source port, purpose IP, destination interface receive with step 3 respectively are identical, and perhaps purpose IP, destination interface, source IP, the source port of the packet that receives with step 3 respectively of its source IP, source port, purpose IP, destination interface are identical; If there is a such record, be that P2P uses then with the package identification that receives in the step 3, turn to step 3 then; Otherwise execution in step 6;
Step 6: the payload of the packet that payload feature field in the P2P feature database of successively step 2 being set up and step 3 receive is mated; If mate successfully; Be the successful pairing P2P protocol type of payload characteristic of coupling in the P2P feature database with this package identification then, execution in step 7 then; Otherwise turn to step 3;
Step 7: according to the step 6 pair P2P protocol type that this packet identified; Extraction document hash information from the payload of this packet; And with source IP, source port, purpose IP, destination interface and the file hash information of this packet as a new record; Add the network flow table to, forward step 3 then to.
Said P2P feature database includes but not limited to the following P2P payload characteristic information relevant with file, and its P2P protocol type field is respectively with corresponding payload feature field:
1. P2P protocol type field: BitTorrent agreement; Corresponding payload feature field: the payload of packet starts with " 0x13BitTorrent protocol ";
2. P2P protocol type field: eDonkey/eMule agreement; Corresponding payload feature field: the payload of packet is " 0x47 " with " 0xe3 " beginning and the 6th byte, is " 0x81 " with " 0xc5 " beginning and the 6th byte perhaps;
3. P2P protocol type field: Gnutella agreement; Corresponding payload feature field: the payload of packet with " GET/uri-res/N2R? urn:sha1: " beginning;
4. P2P protocol type field: Fast Track agreement; Corresponding payload feature field: the payload of packet starts with " GET/.hash=";
5. P2P protocol type field: Direct Connect agreement; Corresponding payload feature field: the payload of packet is with “ $ADCGET file TTH/ " beginning;
6. P2P protocol type field: Ares agreement; Corresponding payload feature field: the payload of packet starts with " GET sha1: ";
Preferably, described in the step 7 from the payload of packet the method for extraction document hash information be:
If the P2P protocol type of this package identification is BitTorrent, then, extract 20 character strings as the file hash information from the 29th beginning of the payload of this packet; If the P2P protocol type of this package identification is eDonkey/eMule, then, extract 16 character strings as the file hash information from the 7th beginning of the payload of this packet; If the P2P protocol type of this package identification is Gnutella, then, extract 32 character strings as the file hash information from the 27th beginning of the payload of this packet; If the P2P protocol type of this package identification is Fast Track, then, extract 40 character strings as the file hash information from the 12nd beginning of the payload of this packet; If the P2P protocol type of this package identification is Direct Connect, then, extract 39 character strings as the file hash information from the 18th beginning of the payload of this packet; If the P2P protocol type of this package identification is Ares, then, extract 28 character strings as the file hash information from the 10th beginning of the payload of this packet.
Beneficial effect
Compare with existing recognition methods, a kind of file-level P 2 P network flow identification method of the present invention is owing to extracted the concrete fileinfo of P2P flow transmission, and grain size of identification is thinner.Use method provided by the invention, network manager can take more effective measures to manage the P2P flow; In addition, the fileinfo that the inventive method identifies can also be used to judge this document legitimacy, analyzes the degree of concern of resource and user's trend such as download behavior.
Embodiment
Below in conjunction with specific embodiment the present invention is elaborated.
Among the embodiment, 5 packets that successively receive are respectively:
1. source IP:60.25.8.92; Source port: 1409, purpose IP:119.6.8.234, destination interface: 7678; Upper strata transport protocol type: UDP, payload (hexadecimal): 01 1e, 60 21 d3 1e, 6,122 91 3b 7a 2f 9b, 00 00 e1 16 05
2. source IP:58.247.204.241; Source port: 2399; Purpose IP:114.223.152.51; Destination interface: 80; Upper strata transport protocol type: TCP, payload (hexadecimal): 13 42 69 7454 6f, 72 72 65 6e, 74 20 70 72 6f, 74 6f, 63 6f 6c, 00 00 00 00 00 10 00 052c 1a ad, 34 85 6e, 44 a3 de fb df 7c fc e6,45 c1 1e, 46 f3,66 4d, 36 2d 332d, 30 2d 2d 4d, 42 6e b0,08 30 02 3a, 05 1f
3. source IP:89.134.31.170; Source port: 1563; Purpose IP:86.106.112.163; Destination interface: 22417, upper strata transport protocol type: TCP, payload (hexadecimal): e3 29 00 0,000 58 07 8d da 14 0b f6 c8 6e 6a d3 45 b5 a5 e7 23 b2 00 20 1e 08 00 f020 08 00 c0 23 08 00 f0 20 08 00 c0 23 08 00 90 26 08
4. source IP:114.223.152.51, source port: 80, purpose IP:58.247.204.241, destination interface: 2399, upper strata transport protocol type: TCP, payload: 00 00 00 01 02
5. source IP:210.51.188.91; Source port: 3680, purpose IP:61.147.114.9, destination interface: 4163; Upper strata transport protocol type: TCP, payload: 15 00 00 00 03 ae b3 ad 4b0c, 00 00 00 00 80 01 00 00 20 00 00 36 d4 ac 4b
The concrete steps of the inventive method are:
Step 1: set up a network flow table, its structure comprises: the source IP of packet, source port, purpose IP, destination interface and file hash information; This table initial condition is empty table.
Step 2: this step can with step 1 simultaneous operation: set up a P2P feature database, comprise the P2P payload characteristic information relevant with file, its P2P protocol type is respectively with corresponding payload characteristic:
1. BitTorrent agreement, the payload of packet starts with " 0x13BitTorrent protocol ";
2. eDonkey/eMule agreement, the payload of packet is " 0x47 " with " 0xe3 " beginning and the 6th byte, is " 0x81 " with " 0xc5 " beginning and the 6th byte perhaps;
3. Gnutella agreement, the payload of packet with " GET/uri-res/N2R? urn:sha1: " beginning;
4. Fast Track agreement, the payload of packet starts with " GET/.hash=";
5. Direct Connect agreement, the payload of packet is with “ $ADCGET file TTH/ " beginning;
6. Ares agreement, the payload of packet starts with " GET sha1: ".
Step 3: receive 1. number packet, the packet header of this packet is resolved, the upper strata transport protocol type that obtains this packet is that UDP, source IP are that 60.25.8.92, source port are 1409, purpose IP is that 119.6.8.234, destination interface are 7678.
Step 4: the upper strata transport protocol type of judging this packet is not TCP, turns to step 3.
Step 3: receive 2. number packet, the upper strata transport protocol type that obtains this packet is that TCP, source IP are that 58.247.204.241, source port are 2399, purpose IP is that 114.223.152.51, destination interface are 80;
Step 4: the upper strata transport protocol type of judging this packet is TCP, turns to step 5;
Step 5: whether inquiry exists a record in the network flow table that step 1 is set up; Source IP, source port, purpose IP and the destination interface of the packet that its source IP, source port, purpose IP and destination interface and step 3 receive are identical, and perhaps purpose IP, destination interface, the source IP of the packet that receives of its source IP, source port, purpose IP and destination interface and step 3 are identical with source port; Because this moment, the network flow table was empty, so there is not such record, turned to step 6;
Step 6: the payload condition code in the P2P feature database of successively step 2 being set up is mated with the 2. payload of number packet; 2. the payload of number packet starts with hexadecimal string 13 42 69 74 546f 72 72 65 6e 74 20 70 72 6f 74 6f 63 6f 6c; The characteristic that meets the BitTorrent agreement; Demarcating this packet is that BitTorrent uses, and turns to step 7;
Step 7: according to the step 6 P2P protocol type that pair 2. number packet identified is BitTorrent; From 2. the 29th beginning of number data packet payload; Extract 20 character string 2c 1a ad, 34 85 6e 44a3 de fb df 7c fc e6,45 c1 1e, 46 f3 66 as the file hash information; And with source IP, source port, purpose IP, destination interface and the file hash information of this packet as a new record, add the network flow table to, turn to step 3 then.
Step 3: resolve in the 3. packet header of number packet to receiving, and the upper strata transport protocol type that obtains this packet is that TCP, source IP are that 89.134.31.170, source port are 1563, purpose IP is that 86.106.112.163, destination interface are 22417;
Step 4: the upper strata transport protocol type of judging this packet is TCP, turns to step 5;
Step 5: whether inquiry exists a record in the network flow table that step 1 is set up; Source IP, source port, purpose IP and the destination interface of the packet that its source IP, source port, purpose IP and destination interface and step 3 receive are identical, and perhaps purpose IP, destination interface, the source IP of the packet that receives of its source IP, source port, purpose IP and destination interface and step 3 are identical with source port; Do not exist such record this moment, turns to step 6;
Step 6: the payload condition code in the P2P feature database of successively step 2 being set up is mated with the 2. payload of number packet; 3. to start the 6th byte with hexadecimal character e3 be hexadecimal character 47 to the payload of number packet; The characteristic that meets the eDonkey/eMule agreement; Demarcating this packet is that eDonkey/eMule uses, and turns to step 7;
Step 7: according to the step 6 P2P protocol type that pair 3. number packet identified is eDonkey/eMule; From 3. the 7th beginning of number data packet payload; Extract 16 character strings, 07 8d da, 14 0b f6 c86e 6a d3,45 b5 a5 e7,23 b2 as the file hash information; And with source IP, source port, purpose IP, destination interface and the file hash information of this packet as a new record, add the network flow table to, turn to step 3.
Step 3: resolve in the 4. packet header of number packet to receiving, and the upper strata transport protocol type that obtains this packet is that TCP, source IP are that 114.223.152.51, source port are 80, purpose IP is that 58.247.204.241, destination interface are 2399;
Step 4: the upper strata transport protocol type of judging this packet is TCP, turns to step 5;
Step 5: whether inquiry exists a record in the network flow table that step 1 is set up; Source IP, source port, purpose IP and the destination interface of the packet that its source IP, source port, purpose IP and destination interface and step 3 receive are identical, and perhaps purpose IP, destination interface, the source IP of the packet that receives of its source IP, source port, purpose IP and destination interface and step 3 are identical with source port; Have a such record this moment, demarcation 4. number packet is that P2P uses, and turns to step 3;
Step 3: resolve in the 5. packet header of number packet to receiving, and the upper strata transport protocol type that obtains this packet is that TCP, source IP are 210.51.188.91, and source port is 3680, and purpose IP is 61.147.114.9, and destination interface is 4163;
Step 4: the upper strata transport protocol type of judging this packet is TCP, turns to step 5;
Step 5: whether inquiry exists a record in the network flow table that step 1 is set up; Source IP, source port, purpose IP and the destination interface of the packet that its source IP, source port, purpose IP and destination interface and step 3 receive are identical, and perhaps purpose IP, destination interface, the source IP of the packet that receives of its source IP, source port, purpose IP and destination interface and step 3 are identical with source port; Do not exist such record this moment, turns to step 6;
Step 6: the payload condition code in the P2P feature database of successively step 2 being set up is mated with the 5. payload of number packet; 5. the payload 15 00 00 00 03 ae b3 ad 4b 0,c00 00 00 00 80 01 00 00 20 00 00 36 d4 ac 4b of number packet do not meet the relevant P2P payload feature database of predefined file, turn to step 3.
Visible by the foregoing description, this file-level P 2 P network flow identification method of the present invention can accurately identify multiple P2P and use, and finds the concrete fileinfo of P2P flow transmission.
The above only is a preferred implementation of the present invention; Should be understood that; For those skilled in the art, under the prerequisite that does not break away from the principle of the invention, can also make some improvement; Perhaps part technical characterictic wherein is equal to replacement, these improvement and replacement also should be regarded as protection scope of the present invention.

Claims (3)

1. file-level P 2 P network flow identification method, it is characterized in that: its concrete operations step is following:
Step 1: set up a network flow table, this list structure comprises following field: the source IP of packet, source port, purpose IP, destination interface and file hash information;
Step 2: this step can with step 1 simultaneous operation: set up a P2P feature database, it only comprises the P2P payload characteristic information relevant with file; The structure of this P2P feature database comprises following field: P2P protocol type, payload characteristic;
Step 3: resolve in the packet header to the packet that receives, obtains upper strata transport protocol type, source IP, source port, purpose IP, the destination interface of this packet;
Step 4: whether the upper strata transport protocol type of judging this packet is TCP, if execution in step 5 then; Otherwise turn to step 3;
Step 5: whether inquiry exists a record in the network flow table that step 1 is set up; Source IP, source port, purpose IP, the destination interface of the packet that its source IP, source port, purpose IP, destination interface receive with step 3 respectively are identical, and perhaps purpose IP, destination interface, source IP, the source port of the packet that receives with step 3 respectively of its source IP, source port, purpose IP, destination interface are identical; If there is a such record, be that P2P uses then with the package identification that receives in the step 3, turn to step 3 then; Otherwise execution in step 6;
Step 6: the payload of the packet that payload feature field in the P2P feature database of successively step 2 being set up and step 3 receive is mated; If mate successfully; Be the successful pairing P2P protocol type of payload characteristic of coupling in the P2P feature database with this package identification then, execution in step 7 then; Otherwise turn to step 3;
Step 7: according to the step 6 pair P2P protocol type that this packet identified; Extraction document hash information from the payload of this packet; And with source IP, source port, purpose IP, destination interface and the file hash information of this packet as a new record; Add the network flow table to, forward step 3 then to.
2. a kind of file-level P 2 P network flow identification method as claimed in claim 1; It is characterized in that: said P2P feature database comprises the following P2P payload characteristic information relevant with file, and its P2P protocol type field is respectively with corresponding payload feature field:
1. P2P protocol type field: BitTorrent agreement; Corresponding payload feature field: the payload of packet starts with " 0x13BitTorrent protocol ";
2. P2P protocol type field: eDonkey/eMule agreement; Corresponding payload feature field: the payload of packet is " 0x47 " with " 0xe3 " beginning and the 6th byte, is " 0x81 " with " 0xc5 " beginning and the 6th byte perhaps;
3. P2P protocol type field: Gnutella agreement; Corresponding payload feature field: the payload of packet with " GET/uri-res/N2R? urn:sha1: " beginning;
4. P2P protocol type field: Fast Track agreement; Corresponding payload feature field: the payload of packet starts with " GET/.hash=";
5. P2P protocol type field: Direct Connect agreement; Corresponding payload feature field: the payload of packet is with “ $ADCGET file TTH/ " beginning;
6. P2P protocol type field: Ares agreement; Corresponding payload feature field: the payload of packet starts with " GET sha1: ".
3. according to claim 1 or claim 2 a kind of file-level P 2 P network flow identification method is characterized in that: described in the step 7 from the payload of packet the method for extraction document hash information be:
If the P2P protocol type of this package identification is BitTorrent, then, extract 20 character strings as the file hash information from the 29th beginning of the payload of this packet; If the P2P protocol type of this package identification is eDonkey/eMule, then, extract 16 character strings as the file hash information from the 7th beginning of the payload of this packet; If the P2P protocol type of this package identification is Gnutella, then, extract 32 character strings as the file hash information from the 27th beginning of the payload of this packet; If the P2P protocol type of this package identification is Fast Track, then, extract 40 character strings as the file hash information from the 12nd beginning of the payload of this packet; If the P2P protocol type of this package identification is Direct Connect, then, extract 39 character strings as the file hash information from the 18th beginning of the payload of this packet; If the P2P protocol type of this package identification is Ares, then, extract 28 character strings as the file hash information from the 10th beginning of the payload of this packet.
CN2010101754826A 2010-05-14 2010-05-14 File-level P2P network flow identification method Expired - Fee Related CN101867601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101754826A CN101867601B (en) 2010-05-14 2010-05-14 File-level P2P network flow identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101754826A CN101867601B (en) 2010-05-14 2010-05-14 File-level P2P network flow identification method

Publications (2)

Publication Number Publication Date
CN101867601A CN101867601A (en) 2010-10-20
CN101867601B true CN101867601B (en) 2012-08-15

Family

ID=42959163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101754826A Expired - Fee Related CN101867601B (en) 2010-05-14 2010-05-14 File-level P2P network flow identification method

Country Status (1)

Country Link
CN (1) CN101867601B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025636B (en) * 2010-12-09 2012-09-05 北京星网锐捷网络技术有限公司 Message feature processing method and device as well as network equipment
CN103220329B (en) * 2013-03-07 2017-02-08 汉柏科技有限公司 P2P protocol identification method based on protocol content identification and behavior identification
CN103532779B (en) * 2013-10-10 2017-07-18 北京锐安科技有限公司 A kind of method and system of quick positioning shunting device packet loss
CN113709001A (en) * 2021-09-01 2021-11-26 深圳市大洲智创科技有限公司 Method for identifying p2p protocol in linux kernel

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750538A (en) * 2005-09-29 2006-03-22 西安交大捷普网络科技有限公司 Method for discovering and controlling of producing flow based on P2P high speed unloading software
CN101192924A (en) * 2006-11-24 2008-06-04 北京大学 P2P storage system coding method based on Reed-Solomon code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060265402A1 (en) * 2005-05-20 2006-11-23 Andrew Edmond Grid network for distribution of files

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750538A (en) * 2005-09-29 2006-03-22 西安交大捷普网络科技有限公司 Method for discovering and controlling of producing flow based on P2P high speed unloading software
CN101192924A (en) * 2006-11-24 2008-06-04 北京大学 P2P storage system coding method based on Reed-Solomon code

Also Published As

Publication number Publication date
CN101867601A (en) 2010-10-20

Similar Documents

Publication Publication Date Title
US10652153B2 (en) Apparatus, systems and methods utilizing dispersive networking
Basescu et al. SIBRA: Scalable internet bandwidth reservation architecture
EP2258084B1 (en) Technique for classifying network traffic and for validating a mechanism for calassifying network traffic
KR101097548B1 (en) Digital object title authentication
CN102404396B (en) Method, device and system for identifying peer-to-peer (P2P) flow and equipment
CN101867601B (en) File-level P2P network flow identification method
US10701582B2 (en) Dynamic application QoS profile provisioning
Yiakoumis et al. Neutral net neutrality
François et al. Network security through software defined networking: a survey
EP3682669B1 (en) Stateful application identification while roaming
Szabo et al. Traffic analysis of mobile broadband networks
Mongkolluksamee et al. Combining communication patterns & traffic patterns to enhance mobile traffic identification performance
CN102082699A (en) P2P (peer-to-peer) protocol identification method on basis of active detection mode
Othman et al. Design and implementation of application based routing using openflow
KR101116109B1 (en) Digital object title and transmission information
Chung et al. Measurement analysis of mobile traffic in enterprise networks
JP2005295457A (en) P2p traffic dealing router and p2p traffic information sharing system using same
KR102376496B1 (en) System for distributed forwarding service stream and method for the same
CN103701713A (en) QoS (Quality of Service) scheduling method based on WIFI (Wireless Fidelity) password of AP (Access Point) router
CN101577644A (en) Peer-to-peer network application traffic identification method
CN102035750A (en) Peer-to-peer (P2P) flow recognizing method and device
Akpinar et al. PPNet: Privacy protected CDN-ISP collaboration for QoS-aware multi-CDN adaptive video streaming
CN101854366A (en) Peer-to-peer network flow-rate identification method and device
JPWO2017138403A1 (en) Control device, control method, and storage medium for storing program
JP2007228217A (en) Traffic decision device, traffic decision method, and program therefor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120815

Termination date: 20130514